首页 > 最新文献

2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)最新文献

英文 中文
Optimization strategies based on algorithm for queue scheduling model and applications of web frontend performance 基于算法的队列调度模型优化策略及web前端性能应用
Tin Ban, Zhiqiang Wei, Yun Gao, Z. Li, Changhe Du, Wenjuan Shi
Through analyses on performances of Web frontend, we can learn about the bottlenecks of Web performance, the load limit and connection limit of browser. In this paper, the optimization strategies were carried out to accommodate the bottlenecks and a new request scheduling algorithm with AQSM was proposed to resolve the two connection restrictions. Some optimization strategies were used to settle the frontend performance problems of some webpages, and the results were in good performances.
通过对Web前端性能的分析,我们可以了解到Web性能的瓶颈,浏览器的负载限制和连接限制。在此基础上,提出了一种新的基于AQSM的请求调度算法来解决这两种连接限制。采用优化策略解决了部分网页的前端性能问题,取得了良好的性能效果。
{"title":"Optimization strategies based on algorithm for queue scheduling model and applications of web frontend performance","authors":"Tin Ban, Zhiqiang Wei, Yun Gao, Z. Li, Changhe Du, Wenjuan Shi","doi":"10.1109/ICSESS.2017.8342925","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342925","url":null,"abstract":"Through analyses on performances of Web frontend, we can learn about the bottlenecks of Web performance, the load limit and connection limit of browser. In this paper, the optimization strategies were carried out to accommodate the bottlenecks and a new request scheduling algorithm with AQSM was proposed to resolve the two connection restrictions. Some optimization strategies were used to settle the frontend performance problems of some webpages, and the results were in good performances.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132338210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web application for automatic code generator using a structured flowchart Web应用程序使用结构化流程图自动生成代码
Chanchai Supaartagorn
A flowchart can be a graphic diagram representation of a programming logic. There are shapes and connectors that represent the different types of actions or steps in a process. A flowchart is a very important tool in the planning phase in a program development cycle. Programmers can use it to design and develop an algorithm of a program. Moreover, a flowchart is also very effective for visual learners to write and comprehend algorithms in computer programming courses. This paper aims to provide a tool which serves as an automatic code generator using a structured flowchart. The tool is composed of basic flowchart shapes to be combined into a structured flowchart that can be converted into source codes. In addition, the system's performance has been evaluated by two groups: 5 experts and 93 general users. The results showed the average values of the satisfaction levels were 4.48 and 4.27 with standard deviations at 0.59 and 0.64 for the experts and the general users respectively. It was found that the system performance of the tool reached an agree level. It was revealed that the developed system can be used precisely as intended in an effective manner.
流程图可以是表示编程逻辑的图形图。有一些形状和连接器表示流程中不同类型的操作或步骤。在程序开发周期的计划阶段,流程图是一个非常重要的工具。程序员可以使用它来设计和开发程序的算法。此外,在计算机编程课程中,流程图对于视觉学习者编写和理解算法也是非常有效的。本文旨在提供一个使用结构化流程图作为自动代码生成器的工具。该工具由基本流程图形状组成,可组合成可转换为源代码的结构化流程图。此外,还对系统的性能进行了两组评价:5名专家和93名一般用户。结果表明,专家和普通用户的满意度均值分别为4.48和4.27,标准差分别为0.59和0.64。结果表明,该工具的系统性能达到了一致的水平。据透露,开发的系统可以准确地按照预期有效地使用。
{"title":"Web application for automatic code generator using a structured flowchart","authors":"Chanchai Supaartagorn","doi":"10.1109/ICSESS.2017.8342876","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342876","url":null,"abstract":"A flowchart can be a graphic diagram representation of a programming logic. There are shapes and connectors that represent the different types of actions or steps in a process. A flowchart is a very important tool in the planning phase in a program development cycle. Programmers can use it to design and develop an algorithm of a program. Moreover, a flowchart is also very effective for visual learners to write and comprehend algorithms in computer programming courses. This paper aims to provide a tool which serves as an automatic code generator using a structured flowchart. The tool is composed of basic flowchart shapes to be combined into a structured flowchart that can be converted into source codes. In addition, the system's performance has been evaluated by two groups: 5 experts and 93 general users. The results showed the average values of the satisfaction levels were 4.48 and 4.27 with standard deviations at 0.59 and 0.64 for the experts and the general users respectively. It was found that the system performance of the tool reached an agree level. It was revealed that the developed system can be used precisely as intended in an effective manner.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133246683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Handwriting forgery detection based on ink colour features 基于墨水颜色特征的笔迹伪造检测
Amr Megahed, Sondos M. Fadl, Q. Han, Qiong Li
Document forgery detection is a vitally important field because the forensic role is used in many types of crimes. Adding new text is the most common type of document forgery methods because it is easy to apply and hard to detect. In this paper, a novel method is proposed to detect the forgery in a text by detecting different ink using image processing instead of conventional methods. All documents are scanned as an image and segmented into objects. Then nine features are extracted from each object based on red, green and blue channels. Distance measurements between each nearby pairs of feature vectors are computed using root mean square error. Modified Thompson Tau test is applied to extract anomaly points. The tampered points are then obtained exactly from anomaly points. Modified Thompson Tau test has a high-efficiency detection and a low omission ratio but its precision is not ideal. Therefore, the second outlier detection has been used to help to make up the difference in precision. The experimental results show that our proposed method can not only detect but also localize tampered objects efficiently.
文件伪造检测是一个非常重要的领域,因为法医的作用在许多类型的犯罪中都有应用。添加新文本是最常见的文档伪造方法,因为它易于应用且难以检测。本文提出了一种利用图像处理技术检测不同油墨对文本进行伪造的新方法。所有文档都作为图像扫描并分割成对象。然后根据红、绿、蓝三个通道提取出每个目标的9个特征。使用均方根误差计算相邻特征向量对之间的距离。采用改进的汤普森Tau检验提取异常点。然后从异常点精确地得到篡改点。改进汤普森Tau检测效率高,漏检率低,但检测精度不理想。因此,第二次异常值检测被用来帮助弥补精度上的差异。实验结果表明,该方法不仅能有效地检测出被篡改对象,而且能有效地定位被篡改对象。
{"title":"Handwriting forgery detection based on ink colour features","authors":"Amr Megahed, Sondos M. Fadl, Q. Han, Qiong Li","doi":"10.1109/ICSESS.2017.8342883","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342883","url":null,"abstract":"Document forgery detection is a vitally important field because the forensic role is used in many types of crimes. Adding new text is the most common type of document forgery methods because it is easy to apply and hard to detect. In this paper, a novel method is proposed to detect the forgery in a text by detecting different ink using image processing instead of conventional methods. All documents are scanned as an image and segmented into objects. Then nine features are extracted from each object based on red, green and blue channels. Distance measurements between each nearby pairs of feature vectors are computed using root mean square error. Modified Thompson Tau test is applied to extract anomaly points. The tampered points are then obtained exactly from anomaly points. Modified Thompson Tau test has a high-efficiency detection and a low omission ratio but its precision is not ideal. Therefore, the second outlier detection has been used to help to make up the difference in precision. The experimental results show that our proposed method can not only detect but also localize tampered objects efficiently.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116365466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Intrusion detection for engineering vehicles under the transmission line based on deep learning 基于深度学习的输电线路下工程车辆入侵检测
Chunjiang Yan, Chuang Wang, J. Du, Hualin Fang, Yixuan Wang, Xuezhi Xiang, Xinli Guo
A two-step method based on deep learning is proposed for the intrusion detection of engineering vehicles working under high power transmission lines. In the first step, intrusion detection algorithm is used to identify the potential target area. Then the results are supplied to a trained deep convolution neural network classifier. This way combining intrusion detection method with CNN, the invasion of the engineering vehicles under high power transmission lines can efficiently be detected up to an accuracy of 97.2 %.
提出了一种基于深度学习的两步法工程车辆入侵检测方法。第一步采用入侵检测算法识别潜在目标区域;然后将结果提供给训练好的深度卷积神经网络分类器。该方法将入侵检测方法与CNN相结合,可以有效检测出高压输电线路下工程车辆的入侵,准确率高达97.2%。
{"title":"Intrusion detection for engineering vehicles under the transmission line based on deep learning","authors":"Chunjiang Yan, Chuang Wang, J. Du, Hualin Fang, Yixuan Wang, Xuezhi Xiang, Xinli Guo","doi":"10.1109/ICSESS.2017.8342861","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342861","url":null,"abstract":"A two-step method based on deep learning is proposed for the intrusion detection of engineering vehicles working under high power transmission lines. In the first step, intrusion detection algorithm is used to identify the potential target area. Then the results are supplied to a trained deep convolution neural network classifier. This way combining intrusion detection method with CNN, the invasion of the engineering vehicles under high power transmission lines can efficiently be detected up to an accuracy of 97.2 %.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115469372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel security validation in embedded system 一种新的嵌入式系统安全验证方法
Xiang Wang, Bin Xu, Weike Wang, Lin Li, Pei Du, Cheng Zhou, Mingzhe Li, Tongsheng Xia
Most embedded systems contain a number of software vulnerabilities, such as program buffer overflow. The physical attacks in embedded systems are also becoming more and more common. This paper presents a fast, effective and reliable algorithm for tagging and validating what can be used in embedded systems. The compiler automatically collects the secure tags for each main memory segment at compile time. At run-time, the designed hardware observes the dynamic execution trace, and checks whether the trace conforms to the permissible behavior and triggers the appropriate response mechanisms according to the check result. This design does not change the compiler or the existing instruction set, with no restriction on the software developer. The design is implemented on an actual SOPC platform. Experimental analysis shows that the proposed techniques can eliminate a wide range of common software and physical attacks, with low performance penalties and minimal overheads.
大多数嵌入式系统都包含许多软件漏洞,例如程序缓冲区溢出。嵌入式系统中的物理攻击也变得越来越普遍。本文提出了一种快速、有效、可靠的标记和验证算法,可用于嵌入式系统。编译器在编译时自动收集每个主内存段的安全标记。在运行时,所设计的硬件观察动态执行跟踪,检查跟踪是否符合允许的行为,并根据检查结果触发相应的响应机制。这种设计不改变编译器或现有的指令集,对软件开发人员没有限制。该设计在一个实际的SOPC平台上实现。实验分析表明,所提出的技术可以消除各种常见的软件和物理攻击,性能损失低,开销最小。
{"title":"A novel security validation in embedded system","authors":"Xiang Wang, Bin Xu, Weike Wang, Lin Li, Pei Du, Cheng Zhou, Mingzhe Li, Tongsheng Xia","doi":"10.1109/ICSESS.2017.8342994","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342994","url":null,"abstract":"Most embedded systems contain a number of software vulnerabilities, such as program buffer overflow. The physical attacks in embedded systems are also becoming more and more common. This paper presents a fast, effective and reliable algorithm for tagging and validating what can be used in embedded systems. The compiler automatically collects the secure tags for each main memory segment at compile time. At run-time, the designed hardware observes the dynamic execution trace, and checks whether the trace conforms to the permissible behavior and triggers the appropriate response mechanisms according to the check result. This design does not change the compiler or the existing instruction set, with no restriction on the software developer. The design is implemented on an actual SOPC platform. Experimental analysis shows that the proposed techniques can eliminate a wide range of common software and physical attacks, with low performance penalties and minimal overheads.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123886948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of students' achievements based on factor analysis and cluster analysis 基于因子分析和聚类分析的学生成绩评价
Yiwei Wu, Xiaoling Xia, Jiajing Le
Evaluating students' achievements which including many subjects is a great challenge. It seems not so accurate that simply adding these scores and ranking, because it is difficult to distinguish which one is a student good at and which one is not. Data mining is a good way to solve this problem. In this paper, students' achievements are appraised based on factor analysis and cluster analysis. First, common factors are extracted from scores of multitudinous subjects. Then factor scores and comprehensive scores can be computed. After that, all students can be segregated into several clusters by cluster analysis based on factor scores. The result shows objective synthetical evaluation of students, which will benefit education in the future.
评估学生的成绩包括许多科目是一个巨大的挑战。简单地把这些分数和排名加起来似乎不那么准确,因为很难区分哪个学生擅长哪个学生不擅长。数据挖掘是解决这一问题的一个很好的方法。本文采用因子分析法和聚类分析法对学生的学习成绩进行评价。首先,从众多受试者的分数中提取共同因素。然后计算因子得分和综合得分。然后,通过基于因子得分的聚类分析,将所有学生分成若干类。结果对学生进行了客观的综合评价,有利于今后的教育工作。
{"title":"Evaluation of students' achievements based on factor analysis and cluster analysis","authors":"Yiwei Wu, Xiaoling Xia, Jiajing Le","doi":"10.1109/ICSESS.2017.8343037","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8343037","url":null,"abstract":"Evaluating students' achievements which including many subjects is a great challenge. It seems not so accurate that simply adding these scores and ranking, because it is difficult to distinguish which one is a student good at and which one is not. Data mining is a good way to solve this problem. In this paper, students' achievements are appraised based on factor analysis and cluster analysis. First, common factors are extracted from scores of multitudinous subjects. Then factor scores and comprehensive scores can be computed. After that, all students can be segregated into several clusters by cluster analysis based on factor scores. The result shows objective synthetical evaluation of students, which will benefit education in the future.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An abstract method linearization for detecting source code plagiarism in object-oriented environment 面向对象环境下源代码抄袭检测的抽象线性化方法
Oscar Karnalim
Despite the fact that plagiarizing source code is a trivial task for most CS students, detecting such unethical behavior requires a considerable amount of effort. Thus, several plagiarism detection systems were developed to handle such issue. This paper extends Karnalim's work, a low-level approach for detecting Java source code plagiarism, by incorporating abstract method linearization. Such extension is incorporated to enhance the accuracy of low-level approach in term of detecting plagiarism in object-oriented environment. According to our evaluation, which was conducted based on 23 design-pattern source code pairs, our extended low-level approach is more effective than state-of-the-art and Karnalim's approach. On the one hand, when compared to state-of-the-art approach, our approach can generate less coincidental similarities and provide more accurate result. On the other hand, when compared to Karnalim's approach, our approach, at some extent, can generate higher similarity when simple abstract method invocation is incorporated.
尽管抄袭源代码对大多数计算机科学专业的学生来说是一件微不足道的事情,但检测这种不道德的行为需要付出相当大的努力。因此,开发了几个剽窃检测系统来处理这一问题。本文扩展了Karnalim的工作,这是一种检测Java源代码抄袭的低级方法,通过合并抽象方法线性化。为了提高底层方法在面向对象环境下抄袭检测的准确性,引入了这种扩展。根据我们基于23个设计模式源代码对进行的评估,我们扩展的低级方法比最先进的方法和Karnalim的方法更有效。一方面,与最先进的方法相比,我们的方法可以产生更少的巧合相似点,提供更准确的结果。另一方面,与Karnalim的方法相比,我们的方法在某种程度上可以在合并简单抽象方法调用时产生更高的相似性。
{"title":"An abstract method linearization for detecting source code plagiarism in object-oriented environment","authors":"Oscar Karnalim","doi":"10.1109/ICSESS.2017.8342863","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342863","url":null,"abstract":"Despite the fact that plagiarizing source code is a trivial task for most CS students, detecting such unethical behavior requires a considerable amount of effort. Thus, several plagiarism detection systems were developed to handle such issue. This paper extends Karnalim's work, a low-level approach for detecting Java source code plagiarism, by incorporating abstract method linearization. Such extension is incorporated to enhance the accuracy of low-level approach in term of detecting plagiarism in object-oriented environment. According to our evaluation, which was conducted based on 23 design-pattern source code pairs, our extended low-level approach is more effective than state-of-the-art and Karnalim's approach. On the one hand, when compared to state-of-the-art approach, our approach can generate less coincidental similarities and provide more accurate result. On the other hand, when compared to Karnalim's approach, our approach, at some extent, can generate higher similarity when simple abstract method invocation is incorporated.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128184916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A reconfigurable high-performance multiplier based on multi-granularity design and parallel acceleration 基于多粒度设计和并行加速的可重构高性能乘法器
Feng Jing, Zijun Liu, Xiaojun Ma, Guo Yang, Guo Peng, Donglin Wang
This paper proposes a reconfigurable high performance multiplier (RHPM) based on multi-granularity design and parallel acceleration. Capable of supporting multiple precisions for different processing requirements, the RHPM can perform one 32×32, two 16×16, or four 8×8 bit unsigned/signed multiplication, or one 16×16, or two 8×8 bit complex number multiplication. The structures of the partial product generator and the partial product accumulator are improved in the paper, so as to reuse most of the hardware resources. Compression can be completed automatically by means of recording the validity of every bit in the partial product array which accelerates the computation dramatically. The RHPM is implemented with TSMC 28nm technology, exhibiting a 0.68s of the critical path delay, while consuming only 0.6281mW in power. Results show its significant superiority in terms of performance and power efficiency compared with our previous work or other similar products.
提出了一种基于多粒度设计和并行加速的可重构高性能乘法器(RHPM)。RHPM能够支持不同处理要求的多种精度,可以执行一个32×32、两个16×16或四个8×8位的无符号/有符号乘法,或者一个16×16或两个8×8位的复数乘法。本文对部分产品产生器和部分产品累加器的结构进行了改进,实现了大部分硬件资源的重用。通过记录部分积数组中每个比特的有效性,可以自动完成压缩,大大加快了计算速度。rpm采用台积电28纳米技术实现,关键路径延迟0.68秒,功耗仅为0.6281mW。结果表明,与我们以前的工作或其他同类产品相比,它在性能和功率效率方面具有显著的优势。
{"title":"A reconfigurable high-performance multiplier based on multi-granularity design and parallel acceleration","authors":"Feng Jing, Zijun Liu, Xiaojun Ma, Guo Yang, Guo Peng, Donglin Wang","doi":"10.1109/ICSESS.2017.8342979","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342979","url":null,"abstract":"This paper proposes a reconfigurable high performance multiplier (RHPM) based on multi-granularity design and parallel acceleration. Capable of supporting multiple precisions for different processing requirements, the RHPM can perform one 32×32, two 16×16, or four 8×8 bit unsigned/signed multiplication, or one 16×16, or two 8×8 bit complex number multiplication. The structures of the partial product generator and the partial product accumulator are improved in the paper, so as to reuse most of the hardware resources. Compression can be completed automatically by means of recording the validity of every bit in the partial product array which accelerates the computation dramatically. The RHPM is implemented with TSMC 28nm technology, exhibiting a 0.68s of the critical path delay, while consuming only 0.6281mW in power. Results show its significant superiority in terms of performance and power efficiency compared with our previous work or other similar products.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128007639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA-based packets processing acceleration platform for VNF 基于fpga的VNF包处理加速平台
Tianyi Lan, Qing Han, Hongwei Fan, Julong Lan
While there has been a belief over the past few years that virtual network functions (VNFs) should be built on common servers, we argue that it can lead to limited performance and large up/down traffic. This paper proposes a new idea of shifting part of NFV functions from software packages to common hardware devices to promote overall performance. Then we present the design and implementation of PPAP, a Packets Processing Acceleration Platform for NFV. It offers high flexibility by allowing functions to control the processing flow of hardware. Dynamic match tables and virtualization techniques ensure isolation among VNF instances.
虽然在过去的几年里,有一种观点认为虚拟网络功能(VNFs)应该构建在公共服务器上,但我们认为它可能会导致有限的性能和大量的上下流量。本文提出了将部分NFV功能从软件包转移到通用硬件设备上以提升整体性能的新思路。在此基础上,提出了NFV报文处理加速平台PPAP的设计与实现。通过允许功能控制硬件的处理流程,它提供了高度的灵活性。动态匹配表和虚拟化技术确保了VNF实例之间的隔离。
{"title":"FPGA-based packets processing acceleration platform for VNF","authors":"Tianyi Lan, Qing Han, Hongwei Fan, Julong Lan","doi":"10.1109/ICSESS.2017.8342922","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342922","url":null,"abstract":"While there has been a belief over the past few years that virtual network functions (VNFs) should be built on common servers, we argue that it can lead to limited performance and large up/down traffic. This paper proposes a new idea of shifting part of NFV functions from software packages to common hardware devices to promote overall performance. Then we present the design and implementation of PPAP, a Packets Processing Acceleration Platform for NFV. It offers high flexibility by allowing functions to control the processing flow of hardware. Dynamic match tables and virtualization techniques ensure isolation among VNF instances.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on global artificial bee colony algorithm based on crossover 基于交叉的全局人工蜂群算法研究
Pinghua Zhang
In order to overcome the shortcomings of artificial bee colony algorithm induding slow convergence speed, easily falling into local optimum value, neglect of development and other issues, Mechanism of other bionic intelligent optimization algorithms, A new algorithm of Global Artificial Bee Colony algorithm based on crossover which can effectively improve the convergence rate, enhance the development of the algorithm and the global optimization ability is proposed, and the algorithm can effectively avoid the local optimum. Finally, the Seven standard test functions are selected to carry out the experiment and simulation. The results show that the convergence speed and accuracy of the proposed algorithm (CGABC) are significantly improved compared with other algorithms such as ABC algorithm, GABC algorithm and so on.
为了克服人工蜂群算法收敛速度慢、易陷入局部最优值、忽视发展等问题,以及其他仿生智能优化算法存在的机理问题,提出了一种基于交叉的全局人工蜂群算法,该算法可以有效地提高收敛速度,增强算法的发展性和全局优化能力。该算法可以有效地避免局部最优。最后,选取七个标准测试函数进行实验和仿真。结果表明,与ABC算法、GABC算法等算法相比,所提算法(CGABC)的收敛速度和精度均有显著提高。
{"title":"Research on global artificial bee colony algorithm based on crossover","authors":"Pinghua Zhang","doi":"10.1109/ICSESS.2017.8342907","DOIUrl":"https://doi.org/10.1109/ICSESS.2017.8342907","url":null,"abstract":"In order to overcome the shortcomings of artificial bee colony algorithm induding slow convergence speed, easily falling into local optimum value, neglect of development and other issues, Mechanism of other bionic intelligent optimization algorithms, A new algorithm of Global Artificial Bee Colony algorithm based on crossover which can effectively improve the convergence rate, enhance the development of the algorithm and the global optimization ability is proposed, and the algorithm can effectively avoid the local optimum. Finally, the Seven standard test functions are selected to carry out the experiment and simulation. The results show that the convergence speed and accuracy of the proposed algorithm (CGABC) are significantly improved compared with other algorithms such as ABC algorithm, GABC algorithm and so on.","PeriodicalId":179815,"journal":{"name":"2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1